[20097] in bugtraq

home help back first fref pref prev next nref lref last post

Re: A subject line buffer overflow in Outlook Express (was Re:

daemon@ATHENA.MIT.EDU (Daniel Naber)
Mon Apr 9 05:00:45 2001

Content-Type: text/plain; charset="iso-8859-1"
MIME-Version: 1.0
Message-ID:  <200104062131.f36LVPo07826@pluto.gt.owl.de>
Date:         Fri, 6 Apr 2001 23:31:25 +0200
Reply-To: Daniel Naber <daniel.naber@T-ONLINE.DE>
From: Daniel Naber <daniel.naber@T-ONLINE.DE>
To: BUGTRAQ@SECURITYFOCUS.COM
In-Reply-To:  <013701c0be4c$1cd22560$220a400a@officeeagle>
Content-Transfer-Encoding: 8bit

On Friday 06 April 2001 05:35, you wrote:

> line buffer of Outlook Express, versions 5.0.x.x and 5.50.x.x.  This
> overflow is exploitable (in the latter version) with the same EML
> content spoofing being discussed in the previous thread.

Regarding buffer overflows: The KMail team offers a test mail folder that 
tries to trigger several bugs and buffer overflows. From the web page:

-- quote ---
Mail client test file v0.5 (55kb): This mbox file triggers some bugs and 
has very long field values to trigger buffer overflows. You may use this 
to find possible security problems - not only in KMail, but in any mail 
client that supports mbox folders. Just copy this file to ~/Mail/ and 
start KMail.
-- /quote ---

You can get the file from http://kmail.kde.org/mail-client-QA.gz

Of course the file is not "complete", you cannot use it the prove the 
security of a mail client. If you have additions (e.g. mails that trigger 
bugs) send them to me and I will include them in the test file.

Regards
 Daniel

-- 
Daniel Naber, Paul-Gerhardt-Str. 2, 33332 Guetersloh, Germany

home help back first fref pref prev next nref lref last post